TY - GEN
T1 - Role based approach to data access in adhoc networks
AU - Memon, Qurban A.
AU - Shakeel Laghari, M.
PY - 2006
Y1 - 2006
N2 - In this paper we combine concepts of role-based access and databases to specify separation of duty (on wireless networks) as required for database integrity. Specifically, we consider adhoc network environment and discuss role access to network databases. We give a description of the methodology and role based model showing how roles can be assigned and how propagation of permissions is handled. Given this general approach, a system developer can design an authorization model for data access and transfer based on roles in an adhoc environment.
AB - In this paper we combine concepts of role-based access and databases to specify separation of duty (on wireless networks) as required for database integrity. Specifically, we consider adhoc network environment and discuss role access to network databases. We give a description of the methodology and role based model showing how roles can be assigned and how propagation of permissions is handled. Given this general approach, a system developer can design an authorization model for data access and transfer based on roles in an adhoc environment.
UR - http://www.scopus.com/inward/record.url?scp=33750818096&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750818096&partnerID=8YFLogxK
U2 - 10.1109/aiccsa.2006.205237
DO - 10.1109/aiccsa.2006.205237
M3 - Conference contribution
AN - SCOPUS:33750818096
SN - 1424402123
SN - 9781424402120
T3 - IEEE International Conference on Computer Systems and Applications, 2006
SP - 1163
EP - 1166
BT - IEEE International Conference on Computer Systems and Applications, 2006
PB - IEEE Computer Society
T2 - IEEE International Conference on Computer Systems and Applications, 2006
Y2 - 8 March 2006 through 8 March 2006
ER -